Free Delivery Over $100
10034 books were found.
This book examines legal and cybersecurity challenges resulting from malicious activities on global cyberspace and... Read More >>
This book is intended to provide practice quiz questions based on the thirty-three areas of study defined for the... Read More >>
Security Smarts for the Self-Guided IT Professional<p>Learn how to improve the security posture of your organization... Read More >>
This book constitutes the thoroughly refereed proceedings of the Third International Conference on Interactive Theorem... Read More >>
Read More >>
Presents a set of guidelines and operating procedures that clarifies the relationship between information security... Read More >>
This book constitutes the refereed proceedings of the 13th International Conference on Web-Age Information Management,... Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the International Conference on Trusted... Read More >>
Learn to recognise hackers’ tracks and uncover network-based evidence in Network Forensics: Tracking Hackers through... Read More >>
This book constitutes the proceedings of the 6th International Conference on Information Theoretic Security, ICITS... Read More >>
This book constitutes the refereed proceedings of the 26th IFIP WG 11.3 International Conference on Data and Applications... Read More >>
Implementing Service Quality based on ISO/IEC 20000 gives a clear and detailed breakdown of the explanations of... Read More >>
Table of Contents: Introduction / Cancelable Biometric System / Cryptographic Key Regeneration Using Biometrics... Read More >>
Revision with unchanged content. Peer-to-Peer (P2P) video conference systems receive more attention recently due... Read More >>
This volume constitutes the refereed proceedings of the 6th IFIP WG 11.2 International Workshop on Information Security... Read More >>
The federal government's role in protecting U.S. citizens and critical infrastructure from cyberattacks has been... Read More >>
Cybersecurity is a sprawling topic that includes national, international, government, and private industry dimensions.... Read More >>
In any technology domain, security has overhead and costs associated with it, and cloud computing is no different.... Read More >>
The National Institute of Standards and Technology Special Publication 800-121 Revision 1, Guide to Bluetooth Security... Read More >>
The National Institute of Standards and Technology Special Publication 800-97 provides readers with a detailed explanation... Read More >>
Designed as a comprehensive introduction to the topic of communications system security, this text covers the basics... Read More >>
Practical, hands-on instruction for securing wireless networks--from the Secure Beginner’s Guide series Read More >>
Designed as an exam-focused, self-study resource kit, this Boxed Set includes CompTIA Network+ Certification Study... Read More >>
Twenty-first century criminals increasingly rely on the Internet and advanced technologies to further their criminal... Read More >>